2010 17th Working Conference on Reverse Engineering

13-16 Oct. 2010

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (291 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (435 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (165 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2010, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (930 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Keynotes; Stevens Lecture

    Publication Year: 2010, Page(s):xiv - xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    Summary form only given. Amazon.com just is a large e-commerce. This article discusses a talk on some of User Interface Engineering's latest research into the hidden treasures of Amazon. The talk reveals the simple Yes/No question that increased revenues by more than $1 billion; the elegant subtlety of Amazon's security system; why Amazon's business model is more than meets the eye, the wins and l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WCRE 2000 Most Influential Paper

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • Normalizing Source Code Vocabulary

    Publication Year: 2010, Page(s):3 - 12
    Cited by:  Papers (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Information Retrieval (IR) based tools complement traditional static and dynamic analysis tools by exploiting the natural language found within a program's text. Tools incorporating IR have tackled problems, such as feature location, that previously required considerable human effort. However, to reap the full benefit of IR-based techniques, the language used across all software artifacts (e.g., r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Studying the Impact of Clones on Software Defects

    Publication Year: 2010, Page(s):13 - 21
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (297 KB) | HTML iconHTML

    There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead to software defects. In our work, we use survival analysis to understand the impact of clones on software defects and to determine the characteristics of cloned code that have the highest impact on software defects. Our su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining Source Code for Structural Regularities

    Publication Year: 2010, Page(s):22 - 31
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    During software development, design rules and contracts in the source code are often encoded through regularities, such as API usage protocols, coding idioms and naming conventions. The structural regularities that govern a program can aid in comprehension and maintenance of the application, but are often implicit or undocumented. Tool support for extracting these regularities from the source code... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Use of Automated Text Summarization Techniques for Summarizing Source Code

    Publication Year: 2010, Page(s):35 - 44
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    During maintenance developers cannot read the entire code of large systems. They need a way to get a quick understanding of source code entities (such as, classes, methods, packages, etc.), so they can efficiently identify and then focus on the ones related to their task at hand. Sometimes reading just a method header or a class name does not tell enough about its purpose and meaning, while readin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Static Analysis for Understanding Shared Objects in Open Concurrent Java Programs

    Publication Year: 2010, Page(s):45 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    Concurrent programming with shared memory in an object-oriented language such as Java is notoriously difficult. Therefore, it is important to study new program understanding techniques for concurrent object-oriented languages. This paper studies shared objects in open concurrent Java programs. First, it proposes a classification of shared objects into three categories: central, owned and distribut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visually Supporting Source Code Changes Integration: The Torch Dashboard

    Publication Year: 2010, Page(s):55 - 64
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1159 KB) | HTML iconHTML

    Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release masters (integrators) to take decisions about the integration of published merged changes into the system release. Most of the time, the release master has to read all the changed code, check the diffs to build an idea of a chang... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Plug-in Test Suites from an Extensibility Perspective

    Publication Year: 2010, Page(s):67 - 76
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (593 KB) | HTML iconHTML

    Plug-in architectures enable developers to build extensible software products. Such products are assembled from plug-ins, and their functionality can be enriched by adding or configuring plug-ins. The plug-ins themselves consist also of multiple plug-ins, and offer dedicated points through which their functionality can be influenced. A well-known example of such an architecture is Eclipse, best kn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Immediacy through Interactivity: Online Analysis of Run-time Behavior

    Publication Year: 2010, Page(s):77 - 86
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    Visualizations of actual run-time data support the comprehension of programs, like examples support the explanation of abstract concepts and principles. Unfortunately, the required run-time analysis is often associated with an inconvenient overhead that renders current tools impractical for frequent use. We propose an interactive approach to collect and present run-time data. An initial shallow an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization

    Publication Year: 2010, Page(s):87 - 96
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2966 KB) | HTML iconHTML

    We present a semi-automated approach for the reverse engineering of UML sequence diagrams. Our approach starts with a set of execution traces that are automatically aligned in order to determine the common behavior. Sequence diagrams are then extracted with an interactive visualization, which allows navigating into execution traces and performing extraction operations. We provide a concrete illust... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluating the Impact of Software Evolution on Software Clustering

    Publication Year: 2010, Page(s):99 - 108
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    The evolution of a software project is a rich data source for analyzing and improving the software development process. Recently, several research groups have tried to cluster source code artifacts based on information about how the code of a software system evolves. The results of these evolutionary approaches seem promising, but a direct comparison to traditional software clustering approaches b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Understanding Feature Evolution in a Family of Product Variants

    Publication Year: 2010, Page(s):109 - 118
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    Existing software product variants, developed by ad hoc reuse such as copy-paste-modify, are often a starting point for building Software Product Line (SPL). Understanding of how features evolved in product variants is a prerequisite to transition from ad hoc to systematic SPL reuse. We propose a method that assists analysts in detecting changes to product features during evolution. We first entai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code

    Publication Year: 2010, Page(s):119 - 128
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    The paper presents an approach that combines conceptual and evolutionary techniques to support change impact analysis in source code. Information Retrieval (IR) is used to derive conceptual couplings from the source code in a single version (release) of a software system. Evolutionary couplings are mined from source code commits. The premise is that such combined methods provide improvements to th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reverse Engineering Self-Modifying Code: Unpacker Extraction

    Publication Year: 2010, Page(s):131 - 140
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (246 KB) | HTML iconHTML

    An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or "packed") form, at runtime, an unpacker routine transforms this to the original executable form of the code, which is then executed. Most of the existing work on analysis of such programs focuses on detecting unpacking and extra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.